Computer Mcqs

Q.  All of the following are examples of real security and privacy risks EXCEPT____________?

a. hackers
b. Spam
c. Viruses
d. identity theft


ANSWER: See Answer
 
No explanation is available for this question!
MCQs:  The process of transferring files from a computer on the Internet to your computer is called_____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  ___________is the process of dividing the disk into tracks and sectors?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  ASCII is a coding system that provides_____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which part of the computer is directly involved in executing the instructions of the computer program?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  When a computer is switched on, the booting process performs___________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A computer system that is old and perhaps not satisfactory is referred to as a(n)____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following is not a binary number?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following does not store data permanently?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following is the smallest storage?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following contains permanent data and gets updated during the processing of transactions?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A modem is connected to_____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Large transaction processing systems in automated organisations use___________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Which of the following is not a storage medium?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The computer abbreviation KB usually means____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The typical computer criminal is a(n)____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  The common name for the crime of stealing passwords is____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Collecting personal information and effectively posing as another individual is known as the crime of_____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  Malicious software is known as____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  A program that performs a useful task while simultaneously allowing destructive acts is a___________?
Category: Computer Science MCQs,   Published by: T-Code Scripts
MCQs:  An intentionally disruptive program that spreads from program to program or from disk to disk is known as a_____________?
Category: Computer Science MCQs,   Published by: T-Code Scripts